/system/keymaster/ |
H A D | hmac.h | 43 // Verify returns true if |digest| is a valid HMAC of |data| using the key 49 bool Verify(const Buffer& data, const Buffer& digest) const; 50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
|
H A D | hmac.cpp | 72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const { function in class:keymaster::HmacSha256 73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(), 77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, function in class:keymaster::HmacSha256
|
H A D | hmac_test.cpp | 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
/system/core/include/ziparchive/ |
H A D | zip_archive_stream_entry.h | 31 virtual bool Verify() = 0;
|
/system/core/gatekeeperd/tests/ |
H A D | gatekeeper_test.cpp | 80 gatekeeper.Verify(request, &response); 117 gatekeeper.Verify(request, &response); 142 gatekeeper.Verify(new_request, &response); 165 gatekeeper.Verify(request, &response); 187 gatekeeper.Verify(new_request, &response); 202 gatekeeper.Verify(request, &response);
|
/system/core/libziparchive/ |
H A D | zip_archive_stream_entry.cc | 56 bool Verify() override; 107 bool ZipArchiveStreamEntryUncompressed::Verify() { function in class:ZipArchiveStreamEntryUncompressed 118 bool Verify() override; 190 bool ZipArchiveStreamEntryCompressed::Verify() { function in class:ZipArchiveStreamEntryCompressed 256 bool Verify() override; 271 bool ZipArchiveStreamEntryRawCompressed::Verify() { function in class:ZipArchiveStreamEntryRawCompressed
|
H A D | zip_archive_test.cc | 524 ASSERT_EQ(verified, stream->Verify());
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper.h | 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle,
|
H A D | trusty_gatekeeper.cpp | 123 int TrustyGateKeeperDevice::Verify(uint32_t uid, uint64_t challenge, function in class:gatekeeper::TrustyGateKeeperDevice 226 return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle,
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 91 impl_->Verify(request, &response);
|
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper.h | 46 void Verify(const VerifyRequest &request, VerifyResponse *response);
|
/system/tpm/trunks/ |
H A D | mock_tpm_utility.h | 66 MOCK_METHOD6(Verify, TPM_RC(TPM_HANDLE,
|
H A D | tpm_utility.h | 150 virtual TPM_RC Verify(TPM_HANDLE key_handle,
|
H A D | tpm_utility_impl.h | 78 TPM_RC Verify(TPM_HANDLE key_handle,
|
H A D | trunks_factory_for_test.cc | 216 TPM_RC Verify(TPM_HANDLE key_handle, 222 return target_->Verify(key_handle, scheme, hash_alg,
|
H A D | trunks_client_test.cc | 131 result = utility->Verify(signing_key, TPM_ALG_NULL, TPM_ALG_NULL, 473 result = utility->Verify(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, 638 result = utility->Verify(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL,
|
H A D | tpm_utility_test.cc | 990 EXPECT_EQ(TPM_RC_SUCCESS, utility_.Verify(key_handle, 1010 EXPECT_EQ(TPM_RC_FAILURE, utility_.Verify(key_handle, 1028 EXPECT_EQ(SAPI_RC_BAD_PARAMETER, utility_.Verify(key_handle, 1046 EXPECT_EQ(SAPI_RC_BAD_PARAMETER, utility_.Verify(key_handle, 1064 EXPECT_EQ(SAPI_RC_BAD_PARAMETER, utility_.Verify(key_handle, 1082 EXPECT_EQ(TPM_RC_FAILURE, utility_.Verify(key_handle, 1100 EXPECT_EQ(SAPI_RC_BAD_PARAMETER, utility_.Verify(key_handle, 1122 EXPECT_EQ(TPM_RC_SUCCESS, utility_.Verify(key_handle, 1146 EXPECT_EQ(TPM_RC_SUCCESS, utility_.Verify(key_handle,
|
H A D | tpm_utility_impl.cc | 620 TPM_RC TpmUtilityImpl::Verify(TPM_HANDLE key_handle, function in class:trunks::TpmUtilityImpl
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 104 void GateKeeper::Verify(const VerifyRequest &request, VerifyResponse *response) { function in class:gatekeeper::GateKeeper
|